1010.cx

  • CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Linux, vulnerability

    The Cybersecurity and Infrastructure Security Agency (CISA) has released an urgent alert for system administrators and IT teams worldwide. Researchers have confirmed that attackers are actively exploiting a serious vulnerability in the sudo utility used on many Linux and Unix systems. This flaw, tracked as CVE-2025-32463, could allow attackers to gain full administrative control of affected machines. Sudo […]

    The post CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers Publish Technical Analysis of Linux Sudo Privilege Escalation

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Linux, macOS, vulnerability

    A team of security researchers has released an in-depth technical report on CVE-2025-32463, a critical local privilege escalation flaw in the widely used Linux sudo utility. The vulnerability, which affects sudo versions 1.9.14 through 1.9.17, allows a local attacker with standard sudo access to gain full root privileges by abusing the tool’s –chroot feature. At the heart […]

    The post Researchers Publish Technical Analysis of Linux Sudo Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    ·

    Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework

    ·

    cyber security, Cyber Security News, XiebroC2

    A surge in attacks targeting improperly managed MS-SQL servers, culminating in the deployment of the open-source XiebroC2 command-and-control (C2) framework. Similar in functionality to legitimate tools like Cobalt Strike, XiebroC2 offers capabilities for information gathering, remote control, and defense evasion, making it an attractive option for threat actors seeking a cost-effective intrusion platform. In one […]

    The post Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code

    ·

    Cyber Attack News, cyber security, Cyber Security News

    A malicious npm package masquerading as the official Postmark MCP Server has been exfiltrating user emails to an external server. 

    This fake “postmark-mcp” module, available on npm from versions 1.0.0 through 1.0.15, built trust over 15 incremental releases before dropping a backdoor in version 1.0.16. 

    The stealthy payload consisted of a single line of code that silently BCC’d every outbound email to the attacker’s domain.

    Postmark-mcp BCC Email Exfiltration Attack

    According to Postmark the attacker published the “postmark-mcp” package under the guise of ActiveCampaign’s Postmark MCP Server library. 

    By aligning naming, versioning, and package description with legitimate Postmark conventions, the malicious actor evaded cursory scrutiny. 

    Developers integrating MCP services via npm install postmark-mcp unknowingly pulled in a trojanized dependency. In version 1.0.16, a lone line inserted into the main transport script added unauthorized BCC functionality:

    Fake Postmark MCP Attack

    This code snippet hooks into the existing Postmark client workflow, leveraging the addHeader method to duplicate outbound emails. 

    Because the malicious line is syntactically innocuous and embedded alongside legitimate header setup logic, it escaped notice in code reviews and automated security scans.

    Thousands of email messages exchanged between developers and their users were silently forwarded to the attacker’s server. 

    Although the legitimate Postmark API and official SDKs remain uncompromised, organizations relying on unverified third-party packages may have suffered unauthorized data leakage.

    Postmark urges all users to immediately:

    • Uninstall “postmark-mcp” from your projects:
    Fake Postmark MCP Attack
    • Examine SMTP logs and Postmark track events for suspicious BCC operations or unexpected API calls.
    • Change any credentials or tokens transmitted during the compromise window to prevent further unauthorized access.

    Postmark reaffirms that it has never published a “postmark-mcp” library on npm. The official packages and SDKs are listed in the Postmark documentation and GitHub repository. 

    Users can verify package authenticity by checking the postmark and postmark.js libraries maintained at github.com/ActiveCampaign/postmark and consulting the API docs at Postmark’s developer portal.

    This incident highlights the critical importance of vetting third-party dependencies. Integrating only officially documented libraries ensures that your email infrastructure remains secure.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Evolving Enterprise Defense to Secure the Modern AI Supply Chain

    ·

    The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • APT35 Hackers Targeting Government and Military to Steal Login Credentials

    ·

    APT, APT35, cyber security, Cyber Security News

    Stormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military entities. In an active threat-hunting operation, Stormshield’s Cyber Threat Intelligence (CTI) team discovered two malicious servers exhibiting hallmark characteristics of APT35 infrastructure. These servers, mirroring footprints documented by Check Point, are hosting phishing pages designed […]

    The post APT35 Hackers Targeting Government and Military to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

    ·

    A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated £5.5 billion (about $7.39 billion) during a raid of her home in London. The cryptocurrency seizure, amounting to 61,000 Bitcoin, is believed to be the single largest such effort in the world, the Metropolitan Police said. Zhimin Qian (aka Yadi Zhang),

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    Organizations using VMware hypervisors face an urgent threat as a local privilege escalation zero-day, tracked as CVE-2025-41244, is under active exploitation in the wild. Both VMware Tools and VMware Aria Operations’ Service Discovery Management Pack (SDMP) are affected, enabling unprivileged users to achieve root-level code execution without authentication.  The vulnerability has been weaponized by the UNC5174 […]

    The post VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious Code in Fake Postmark MCP Server Steals Thousands of Emails

    ·

    cyber security, Cyber Security News, Postmark

    A newly discovered attack on the npm ecosystem has exposed a deceptive backdoor embedded in a malicious package impersonating Postmark. The package, named postmark-mcp, quietly siphoned off thousands of emails from unsuspecting developers and organizations, all with just one line of code. Over the course of 15 incremental releases, the threat actor behind postmark-mcp built […]

    The post Malicious Code in Fake Postmark MCP Server Steals Thousands of Emails appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 380 381 382 383 384 … 557
Next Page

1010.cx

cybersecurity / defense / intelligence